Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (2): 504-511.DOI: 10.11772/j.issn.1001-9081.2023030272
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Zheng WANG1, Jingwei WANG1, Xinchun YIN1,2,3()
Received:
2023-03-16
Revised:
2023-04-21
Accepted:
2023-04-24
Online:
2023-05-09
Published:
2024-02-10
Contact:
Xinchun YIN
About author:
WANG Zheng, born in 1998, M. S. candidate. His research interests include attribute based encryption.Supported by:
通讯作者:
殷新春
作者简介:
王政(1998—),男,江苏淮安人,硕士研究生,主要研究方向:属性基加密基金资助:
CLC Number:
Zheng WANG, Jingwei WANG, Xinchun YIN. Searchable electronic health record sharing scheme with user revocation[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
王政, 王经纬, 殷新春. 支持用户撤销的可搜索电子健康记录共享方案[J]. 《计算机应用》唯一官方网站, 2024, 44(2): 504-511.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023030272
方案 | 用户撤销 | 关键字搜索 | 访问控制策略 | 在线/离线加密 |
---|---|---|---|---|
文献[ | 支持 | 支持 | LSSS | 不支持 |
文献[ | 支持 | 不支持 | LSSS | 不支持 |
文献[ | 支持 | 不支持 | LSSS | 不支持 |
文献[ | 支持 | 支持 | 访问树 | 不支持 |
文献[ | 不支持 | 支持 | 访问树 | 不支持 |
本文方案 | 支持 | 支持,陷门长度固定 | LSSS | 支持 |
Tab. 1 Function comparison
方案 | 用户撤销 | 关键字搜索 | 访问控制策略 | 在线/离线加密 |
---|---|---|---|---|
文献[ | 支持 | 支持 | LSSS | 不支持 |
文献[ | 支持 | 不支持 | LSSS | 不支持 |
文献[ | 支持 | 不支持 | LSSS | 不支持 |
文献[ | 支持 | 支持 | 访问树 | 不支持 |
文献[ | 不支持 | 支持 | 访问树 | 不支持 |
本文方案 | 支持 | 支持,陷门长度固定 | LSSS | 支持 |
方案 | |||||
---|---|---|---|---|---|
文献[ | — | ||||
文献[ | — | ||||
文献[ | — | ||||
文献[ | |||||
文献[ | — | ||||
本文方案 |
Tab. 2 Computational overhead comparison
方案 | |||||
---|---|---|---|---|---|
文献[ | — | ||||
文献[ | — | ||||
文献[ | — | ||||
文献[ | |||||
文献[ | — | ||||
本文方案 |
方案 | 系统公共参数 | 属性私钥 | 转换密钥 | 搜索陷门 | 密文 |
---|---|---|---|---|---|
文献[ | — | ||||
文献[ | — | ||||
文献[ | |||||
文献[ | — | ||||
文献[ | — | ||||
本文方案 |
Tab. 3 Storage overhead comparison of several schemes
方案 | 系统公共参数 | 属性私钥 | 转换密钥 | 搜索陷门 | 密文 |
---|---|---|---|---|---|
文献[ | — | ||||
文献[ | — | ||||
文献[ | |||||
文献[ | — | ||||
文献[ | — | ||||
本文方案 |
1 | JIANG Q, MA J, WEI F. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services[J]. IEEE Systems Journal, 2018, 12(2): 2039-2042. 10.1109/jsyst.2016.2574719 |
2 | GATOUILLAT A, BADR Y, MASSOT B, et al. Internet of medical things: a review of recent contributions dealing with cyber-physical systems in medicine[J]. IEEE Internet of Things Journal, 2018, 5(5): 3810-3822. 10.1109/jiot.2018.2849014 |
3 | SANTAGATI G E, DAVE N, MELODIA T. Design and performance evaluation of an implantable ultrasonic networking platform for the internet of medical things[J]. IEEE/ACM Transactions on Networking, 2020, 28(1): 29-42. 10.1109/tnet.2019.2949805 |
4 | GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C] // Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. 10.1145/1180405.1180418 |
5 | LI J, YU Q, ZHANG Y, et al. Key-policy attribute-based encryption against continual auxiliary input leakage[J]. Information Sciences, 2019, 470: 175-188. 10.1016/j.ins.2018.07.077 |
6 | DAI W, DORÖZ Y, POLYAKOV Y, et al. Implementation and evaluation of a lattice-based key-policy ABE scheme[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1169-1184. 10.1109/tifs.2017.2779427 |
7 | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C] // Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11 |
8 | PU Y, HU C, DENG S, et al. R²PEDS: a recoverable and revocable privacy-preserving edge data sharing scheme[J]. IEEE Internet of Things Journal, 2020, 7(9): 8077-8089. 10.1109/jiot.2020.2997389 |
9 | ZHANG L, YOU W, MU Y. Secure outsourced attribute-based sharing framework for lightweight devices in smart health systems[J]. IEEE Transactions on Services Computing, 2022, 15(5): 3019-3030. 10.1109/tsc.2021.3073740 |
10 | HAN D, PAN N, LI K-C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 316-327. 10.1109/tdsc.2020.2977646 |
11 | XUE K, GAI N, HONG J, et al. Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 635-646. 10.1109/tdsc.2020.2987903 |
12 | OBIRI I A, XIA Q, XIA H, et al. Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable[J]. Journal of Computer Security, 2022, 30(2): 291-324. 10.3233/jcs-210045 |
13 | SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2000: 44-55. |
14 | BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]// Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004: 506-522. 10.1007/978-3-540-24676-3_30 |
15 | LAI J, ZHOU X, DENG R H, et al. Expressive search on encrypted data[C]// Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. New York: ACM, 2013: 243-252. 10.1145/2484313.2484345 |
16 | LV Z, HONG C, ZHANG M, et al. Expressive and secure searchable encryption in the public key setting[C] // Proceedings of the 2014 International Conference on Information Security. Cham: Springer, 2014: 364-376. 10.1007/978-3-319-13257-0_21 |
17 | 殷新春, 王梦宇, 宁建廷. 轻量级可搜索医疗数据共享方案[J]. 通信学报, 2022, 43(5): 110-122. 10.11959/j.issn.1000-436x.2022090 |
YIN X C, WANG M Y, NING J T. Lightweight searchable medical data sharing scheme[J]. Journal on Communications, 2022, 43(5): 110-122. 10.11959/j.issn.1000-436x.2022090 | |
18 | PIRRETTI M, TRAYNOR P, McDANIEL P, et al. Secure attribute-based systems[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 99-112. 10.1145/1180405.1180419 |
19 | YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2010: 261-270. 10.1145/1755688.1755720 |
20 | OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryption with non-monotonic access structures[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 195-203. 10.1145/1315245.1315270 |
21 | STADDON J, GOLLE P, GAGNÉ M, et al. A content-driven access control system[C]// Proceedings of the 7th Symposium on Identity and Trust on the Internet. New York: ACM, 2008: 26-35. 10.1145/1373290.1373296 |
22 | MA H, ZHANG R, SUN S, et al. Server-aided fine-grained access control mechanism with robust revocation in cloud computing[J]. IEEE Transactions on Services Computing, 2019, 15(1): 164-173. |
23 | EDEMACU K, JANG B, KIM J W. Collaborative eHealth privacy and security: an access control with attribute revocation based on OBDD access structure[J]. IEEE Journal of Biomedical and Health Informatics, 2020, 24(10): 2960-2972. 10.1109/jbhi.2020.2973713 |
24 | 王光波, 刘海涛, 王晨露, 等. 云存储环境下可撤销属性加密[J]. 计算机研究与发展, 2018, 55(6): 1190-1200. 10.7544/issn1000-1239.2018.20170063 |
WANG G B, LIU H T, WANG C L, et al. Revocable attribute based encryption in cloud storage[J]. Journal of Computer Research and Development, 2018, 55 (6): 1190-1200. 10.7544/issn1000-1239.2018.20170063 | |
25 | KRAWCZYK H, RABIN T. Chameleon signatures[C]// Proceedings of the 2000 Network and Distributed System Security Symposium. San Diego: The Internet Society, 2000: 143-154. |
26 | LI J, ZHANG Y, CHEN X, et al. Secure attribute-based data sharing for resource-limited users in cloud computing[J]. Computers & Security, 2018, 72: 1-12. 10.1016/j.cose.2017.08.007 |
27 | KHALILI M, DAKHILALIAN M, SUSILO W. Efficient chameleon hash functions in the enhanced collision resistant model[J]. Information Sciences, 2020, 510: 155-164. 10.1016/j.ins.2019.09.001 |
28 | DE S J, RUJ S. Efficient decentralized attribute based access control for mobile clouds[J]. IEEE Transactions on Cloud Computing, 2017, 8(1): 124-137. |
29 | 伍祈应, 马建峰, 李辉, 等. 支持用户撤销的多关键字密文查询方案[J]. 通信学报, 2017, 38(8): 183-193. 10.11959/j.issn.1000-436x.2017094 |
WU Q Y, MA J F, LI H, et al. Multi-keyword search over encrypted data with user revocation[J]. Journal on Communications, 2017, 38 (8): 183-193. 10.11959/j.issn.1000-436x.2017094 | |
30 | 牛淑芬, 谢亚亚, 杨平平, 等. 区块链上基于云辅助的属性基可搜索加密方案[J]. 计算机研究与发展, 2021, 58(4): 811-821. 10.7544/issn1000-1239.2021.20200041 |
NIU S F, XIE Y Y, YANG P P, et al. Cloud-assisted attribute-based searchable encryption scheme on blockchain[J]. Journal of Computer Research and Development, 2021, 58(4): 811-821. 10.7544/issn1000-1239.2021.20200041 |
[1] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[2] | Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG. SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall [J]. Journal of Computer Applications, 2024, 44(11): 3495-3502. |
[3] | Xiaoyu DU, Shuaiqi LIU, Zhijie HAN, Zhenxiang HUO, Yujing WANG. Patient-centric medical information sharing scheme based on IPFS and blockchain [J]. Journal of Computer Applications, 2024, 44(10): 3122-3133. |
[4] | Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG. Dictionary partition vector space model for ciphertext ranked search in cloud environment [J]. Journal of Computer Applications, 2023, 43(7): 1994-2000. |
[5] | PANG Xiaoqiong, WANG Yunting, CHEN Wenjun, JIANG Pan, GAO Yanan. Fair and verifiable multi-keyword ranked search over encrypted data based on blockchain [J]. Journal of Computer Applications, 2023, 43(1): 130-139. |
[6] | Jingwen WU, Xinchun YIN, Jianting NING. Traceable and revocable multi-authority attribute-based encryption scheme for vehicular ad hoc networks [J]. Journal of Computer Applications, 2022, 42(6): 1695-1701. |
[7] | Li LI, Yi WU, Zhikun YANG, Yunpeng CHEN. Medical electronic record sharing scheme based on sharding-based blockchain [J]. Journal of Computer Applications, 2022, 42(1): 183-190. |
[8] | Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN. Searchable encryption scheme based on splittable inverted index [J]. Journal of Computer Applications, 2021, 41(11): 3288-3294. |
[9] | ZHANG En, HOU Yingying, LI Gongli, LI Huimin, LI Yu. Adaptive hierarchical searchable encryption scheme based on learning with errors [J]. Journal of Computer Applications, 2020, 40(1): 148-156. |
[10] | LUO Wenjun, WEN Shenglian, CHENG Yu. Blockchain-based electronic health record sharing scheme [J]. Journal of Computer Applications, 2020, 40(1): 157-161. |
[11] | PANG Xiaoqiong, YAN Xiaolong, CHEN Wenjun, YU Benguo, NIE Mengfei. Dynamic multi-keyword ranked search over encrypted data supporting semantic extension [J]. Journal of Computer Applications, 2019, 39(4): 1059-1065. |
[12] | DAI Houle, YANG Geng, MIN Zhao'e. Multi-keyword parallel ciphertext retrieval scheme in distributed environment [J]. Journal of Computer Applications, 2019, 39(10): 2948-2954. |
[13] | BAI Ping, ZHANG Wei, LI Cong, WANG Xu'an. Verifiable ciphertext retrieval scheme with user revocation [J]. Journal of Computer Applications, 2018, 38(6): 1640-1643. |
[14] | ZENG Xiaofei, LU Jianzhu, WANG Jie. Broadcast authentication using cooperative sensor nodes [J]. Journal of Computer Applications, 2016, 36(8): 2219-2224. |
[15] | ZHANG Xinpeng, XU Chunxiang, ZHANG Xinyan, SAI Wei, HAN Xingyang, LIU Guoping. Efficient public auditing scheme for cloud storage supporting user revocability with proxy re-signature scheme [J]. Journal of Computer Applications, 2016, 36(7): 1816-1821. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||